Webinars

Webinars

  • A Partnership Initiative of Industry and Academia

    At present, Cyberattacks are not limited to any particular industry. Academia and industries must work together to determine solutions to protect the organization from Cyberattacks. This talk will cover the hacks of Academia and Industry partnerships to address Cyberattacks and Cybersecurity skill gaps. Key Take-Away: • Collaboration Strategies between Academia and Industry to address Cyberattacks • Mitigation Strategies to address Cybersecurity skill gaps • Strategies of community involvement to mitigate cyber attacks Read More

  • The Future CISO: Securing the digital organisation of the future

    Following a turbulent two years, former-CISO and Distinguished Analyst at the ISF Paul Watts, is considering key recommendations for CISOs to change/maintain their (and their team's) prominence and relevance to their stakeholders. Join us on the 20th July at 13:00 BST for a presentation that will reflect on where CISOs find themselves today, and what changes they will be looking at to ensure their role continues to add value to an increasingly technically competent digital enterprise. Paul Watts is a Distinguished Analyst of the ISF and joined in August 2021. He has worked in cyber security for over sixteen years as a security executive and CISO in several industry sectors including financial services, retail, critical national infrastructure, food and beverage, data analytics and market research. A certified information security professional holding credentials from both ISC² and ISACA, he has previously spoken and written on many security leadership topics including engaging with the board, building and sustaining robust enterprise security cultures, sustaining high-performing security teams and managing mental well-being in the cyber security industry. Paul is also a Chartered IT Professional and a member of the British Computer Society. Read More

  • Threat Detection and Mitigation Strategies for Small Businesses

    At present, small businesses face greater impact from cyber attacks than larger businesses. There are many reasons for this which include insufficient implementation of cyber security programs, lack of practicing security culture, staff shortages and ineffective mitigation policies. Tune into this talk to learn best practices around threat detection and mitigation approaches specifically for small businesses and come away with a better understanding of: - Best threat detection approaches for small businesses; - Mitigation strategies to address cyber attacks; - Resources for small businesses to create, implement and evaluate their threat and mitigation strategies. Read More

  • Threat Intelligence Today: Securing Endpoints Against Malware

    Malwarebytes' 2022 Threat Review reported 77% more malicious software detected in 2021 than in 2020. Cyberattacks are vicious, causing millions of dollars in losses as organizations scramble to recover stolen data, identities, and reputation. As malicious threats continue to breach network and endpoint defenses, organizations need to prioritize their endpoint detection and response strategy. In Threat Intelligence Today: Securing Endpoints Against Malware, Malwarebytes Security Evangelist Adam Kujawa will delve deep into how organizations can secure their hybrid and remote environments against the ongoing rise in malware. Tune in to learn more about real-world protection and incident response techniques as well as: - The latest attack trends and prevention strategies as well as tool kits available to help organizations balance prevention and resilience for real-time continuous cyber protection - How Malwarebytes and other third-party resources can keep organizations secure while saving them time, money, and resources - Drawbacks and benefits of using Security Operations Centers to investigate security breaches real-time Read More

  • The Endpoint Security Alphabet Stew Must Include VM and PM

    Endpoint Security can either be the first or the last line of defense. From the beginning, it has primarily been accomplished by adding some type of shielding such as a simple anti-virus program but has since evolved into EDR (endpoint detection and response) and XDR (eXtended detection and response). Ensuring the endpoint is hardened against threats is the most effective mechanism to secure endpoints as the vast majority of breaches are caused by known vulnerabilities that exploit unpatched devices. This presentation will provide information on how to create peace of mind regarding all your endpoints by increasing overall vulnerability and patch management. Join this discussion to learn: - Why EDR, XDR, and MDR are not enough for complete endpoint security management; - Understand the overall damage caused by unpatched vulnerabilities; - How to increase overall visibility into the status and behaviors of endpoints and the value this provides to the organization; - Explore how the endpoint security solutions must include all types of endpoints including mobile and virtual; - Ensure all endpoints are up-to-date with patches, how to automate the process, and what to do when they are not; - Encourage collaboration between IT and security teams in regards to endpoint security management. Read More

  • How to Move to Multi-Cloud App Delivery without Refactoring

    Over 94% of customers, according to a recent Pulse Survey, plan to move applications to multi-cloud by 2023. The need to re-factor or re-platform applications per environment with siloed point products remains a critical challenge for organizations. VMware’s advanced load balancing solution has helped customers orchestrate traffic across on-prem and cloud with consistent policies. Learn how to: · Achieve multi-cloud consistency across AWS, Azure, GCP, VCF and more · Orchestrate with automation using Terraform and Ansible · See and troubleshoot with full visibility and API integration to Splunk and Grafana · Take advantage of agility and elasticity and bring public cloud experience to on-premises Rahul Phadke, Senior Product Line Manager, VMware Sayli More, Solutions Architect, VMware Read More

  • You Have Chosen Your Cloud(s), How About App Delivery and Security?

    App delivery and security should not be an afterthought as you choose which environments to expand your multi-cloud applications. Avoid the trade-off between a sub-optimal cloud-specific solution and a feature-rich legacy virtual appliance solution. Pick a truly multi-cloud solution - one that gives you both the enterprise-grade features and cloud-native experience in every cloud. Join this webinar to learn about: · Multi-cloud app delivery and security that includes load balancing, GSLB, K8s ingress, WAF, DDoS, and bot management · A consistent solution for both lift-and-shift and cloud-native applications · Multi-cloud consistency, cloud-native automation, real-time end-to-end observability, and significant total cost savings Ashish Shah, Senior Director Product Management, VMware Lei Yang, Director of Product Marketing, VMware Read More

  • Unpacking Endpoint Detection and Response

    As the methods and practices used to attack digital assets become more refined, the security tools to combat the threats must evolve, shifting from reactive to proactive methods. This change means security teams must learn about and assess a slew of acronyms, including endpoint detection and response (EDR), network detection and response (NDR), managed detection and response (MDR) and extended detection. and response (XDR). They also must consider new methods for addressing and preventing alert fatigue, such as using AI or cloud-based services. In this panel, experts discuss the types of endpoint detection and response available and how to tease out which is best for your organization. Join us to learn: --Why EDR alone is not enough --How to inventory your endpoints and their protection needs --How to evaluate MDR options including MEDR, MNDR and MXDR --The difference between hybrid XDR and native XDR --Operational benefits of XDR --How SIEM and SOAR compare with XDR Read More

  • Case Study on Migrating to a Multi-Cloud Load Balancing Solution

    Multi-cloud is the reality, so let’s look at real-world deployments on migration from on-prem to cloud. Timothy from the VMware Workspace ONE® Unified Endpoint Management (UEM) team will share his experience migrating from legacy hardware load balancers such as F5 on-prem to a SaaS solution hosted on VMware Cloud on AWS. Join this panel discussion to learn: · Why Avi is chosen over legacy hardware load balancers · How automation is a key enabler in multi-cloud expansion · What benefits are realized, including visibility, ease of management and cost savings Moderator: Lei Yang, Director of Product Marketing, VMware Tim Strupp, Staff Engineer, VMware Abhinav Modi, Director, Product Management, VMware Mittali Chawla, Senior Technical Product Manager, VMware Read More

  • Cutting through the Fog of More: Use MDR or XDR to Find Real Threats

    Endpoint protection alone used to be good enough for companies. But now we have too many alerts, from too many systems along with “the Fog of More” making it more difficult to locate and address security threats. How do you cut through all these alerts to pinpoint real threats to your environment? Can MDR or XDR actually help you focus on what is important or are these just buzzwords? In this session, we will review real world examples to see how MDR helped a small security team focus their limited time available to cut through the fog and effectively address the critical alerts and incidents in their environment. Read More